The chapter discusses how one small business planned for, and implemented, the
security of its data in a new enterprise-wide system. The company’s data was perceived
as sensitive, and any breach of privacy as commercially ...